Cybersecurity

WannaLaugh: A Configurable Ransomware Emulator — Learning to Mimic Malicious Storage Traces

Authors: Dionysios Diamantopoulos, Roman Pletka, Slavisa Sarafijanovic, A. L. Narasimha Reddy, Haris Pozidis | Published: 2024-03-12 | Updated: 2024-06-12
Cybersecurity
Ransomware Assessment
Selection and Evaluation of Optimization Algorithms

Using LLMs for Tabletop Exercises within the Security Domain

Authors: Sam Hays, Jules White | Published: 2024-03-03
Cybersecurity
Tabletop Exercise Challenges
Prompt Injection

Employing LLMs for Incident Response Planning and Review

Authors: Sam Hays, Jules White | Published: 2024-03-02
Incident Response Plan
Cybersecurity
Risk Management

Crimson: Empowering Strategic Reasoning in Cybersecurity through Large Language Models

Authors: Jiandong Jin, Bowen Tang, Mingxuan Ma, Xiao Liu, Yunfei Wang, Qingnan Lai, Jia Yang, Changling Zhou | Published: 2024-03-01
Cybersecurity
Enhancement of Strategic Insights
Vulnerability Management

On the Role of Similarity in Detecting Masquerading Files

Authors: Jonathan Oliver, Jue Mo, Susmit Yenkar, Raghav Batta, Sekhar Josyoula | Published: 2024-02-17
Cybersecurity
Integration of Digital Signatures and Machine Learning
Malware Classification

ROSpace: Intrusion Detection Dataset for a ROS2-Based Cyber-Physical System

Authors: Tommaso Puccetti, Simone Nardi, Cosimo Cinquilli, Tommaso Zoppi, Andrea Ceccarelli | Published: 2024-02-13
Cybersecurity
Data Collection
Intrusion Detection System

CyberMetric: A Benchmark Dataset based on Retrieval-Augmented Generation for Evaluating LLMs in Cybersecurity Knowledge

Authors: Norbert Tihanyi, Mohamed Amine Ferrag, Ridhi Jain, Tamas Bisztray, Merouane Debbah | Published: 2024-02-12 | Updated: 2024-06-03
LLM Performance Evaluation
Cybersecurity
Dataset Generation

A Review and Comparison of AI Enhanced Side Channel Analysis

Authors: Max Panoff, Honggang Yu, Haoqi Shan, Yier Jin | Published: 2024-02-03
Watermarking
Cybersecurity
Deep Learning Method

algoXSSF: Detection and analysis of cross-site request forgery (XSRF) and cross-site scripting (XSS) attacks via Machine learning algorithms

Authors: Naresh Kshetri, Dilip Kumar, James Hutson, Navneet Kaur, Omar Faruq Osama | Published: 2024-02-01
Algorithm
Website Vulnerability
Cybersecurity

Ransomware threat mitigation through network traffic analysis and machine learning techniques

Authors: Ali Mehrban, Shirin Karimi Geransayeh | Published: 2024-01-27 | Updated: 2024-02-04
Cybersecurity
Ransomware Assessment
Machine Learning Method